Share: Email | Twitter

ID

VDE-2025-026

Published

2025-05-12 10:00 (CEST)

Last update

2025-05-12 10:00 (CEST)

Vendor(s)

AUMA Riester GmbH & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
AC1.2 >06.00.00 < 06.09.04
MEC 03.01 < 01.02.00
PROFOX < 01-01.10.00
SGx/SVx >03.00.00 < 03.05.01
TIGRON < 01-01.09.00
TIGRON SIL < 02-01.01.00

Summary

Sending too much data in the service telegram of AUMA actuators leads to a buffer overflow in the actuator controls. Depending on the actuator, the service telegram is transmitted either via Bluetooth or RS232


CVE ID

CVE-2025-3496

Last Update:

May 9, 2025, 1:31 p.m.

Weakness

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')  (CWE-120) 

Summary

An unauthenticated remote attacker can cause a buffer overflow which could lead to unexpected behaviour or DoS via Bluetooth or RS-232 interface.

Details

certvde.com 

Impact

A buffer overflow can lead to an unexpected behaviour e.g. to restart of the actuator controls.

Solution

Mitigation

As the Bluetooth interface or the alternatively available RS-232 interface is not required for normal operation, it is advisable to only activate it or only use it when it is required, e.g. when configuring the actuator or reading diagnostic data. It should be deactivated under normal operation conditions.

Remediation

For actuators with Bluetooh, it is recommended to update the firmware of the actuator controls to a new version in order to avoid a buffer overflow. For actuators without Bluetooth, it is recommended to restrict physical access to the actuator and/or update the firmware if possible.

Reported by

CERT@VDE coordinated with AUMA Riester

Reporting: Dennis Schaefer from ONEKEY GmbH